50 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
BlackBerry Summit 2023
CONNECT. LEARN. BE INSPIRED. The BlackBerry Summit brings together visionaries from across the BlackBerry community, including technology innovators, leading enterprises, and strategic partners. It will showcase the latest software innovations, built by BlackBerry, and share how they are transforming the way our customers, partners and people around the world live and work. Meet with likeminded executives, from across a range of industries, to...
October 17, 2023
Organizer: Blackberry
Location: New York City, NY
Add Favorite
Powering Critical Event Management: How...
Join us for an exclusive live webinar to learn how BlackBerry AtHoc along with SparkCognition, optimize critical event management and ensure seamless incident response by leveraging the latest advancement in artificial intelligence. Discover how BlackBerry® AtHoc® critical event management integrates with SparkCognition’s advanced AI algorithm to enable rapid decision making, improve awareness and enhance the effectiveness of you...
June 7, 2023
Organizer: Blackberry
Location: Webcast
Add Favorite
BlackBerry Security Summit 2022 | Top 2...
Join BlackBerry CISO John McClurg and former Gartner Sr. Director Analyst Paul Webber to discuss the top cybersecurity threats and responses. You’ll learn adversary tactics, AI, transitioning from reactive protection to preventative tactics, merging physical and cybersecurity preparedness, and more.
January 17, 2023
Organizer: Blackberry
Location: Webcast
Add Favorite
BlackBerry Security Summit 2022 | Unpac...
The security perimeter is everywhere, yet invisible. And it’s under siege. Learn how our Zero Trust Security Model secures your business assets and our behavioral intelligence offers smarter security, privacy, and trusted access to any business app on any managed or unmanaged device–anywhere.
January 10, 2023
Organizer: Blackberry
Location: Webcast
Add Favorite
Strengthening Security Program Outcomes...
As enterprise infrastructures have expanded in scope and complexity, so too have the cyberthreats that target them. In today’s digital-first environment, legacy security controls are unlikely to be able to stand up to the volume and sophistication of these attacks. Even newer security software may be overwhelming and require nuanced human intervention, which is not always accessible due to the continuing security skills shortage. To addr...
January 3, 2023
Organizer: Blackberry
Location: Webcast
Add Favorite
Update CylancePROTECT 3 to Automate and...
Security environments are continuously becoming more complex, burdening security professionals with endless alerts and maintenance. All the while, cybersecurity professionals are becoming scarcer. But, upgrading your endpoint environment shouldn't equate to more complexity. Watch this on-demand webinar to learn more about the new capabilities within CylancePROTECT® 3 – to enhance and improve your security posture with an automated ap...
January 3, 2023
Organizer: Blackberry
Location: Webcast
Add Favorite
Shape Your Cybersecurity Funnel with Ze...
A cybersecurity protocol can commonly be broken down into three stages: prevention; detection & response; and recovery. By implementing effective protocols at the beginning of the funnel, companies can dramatically reduce the number of threats that require an active response. Yet many organizations have decided to focus on the bottom of the funnel, resigning themselves to handle a large volume of cyberthreats. This will be a resource drain...
December 27, 2022
Organizer: Blackberry
Location: Webcast
Add Favorite
Symbiote 101: How to Secure Users Again...
A few months ago, in a joint collaboration with Intezer, we discovered a new, previously undetected malware that acts in a parasitic nature and affects Linux® operating systems. It appears to have been written to target the financial sector in Latin America. We have aptly named this malware Symbiote. Symbiote is a highly evasive malware whose main objective is to capture credentials and to facilitate backdoor access to infected machines. O...
December 27, 2022
Organizer: Blackberry
Location: Webcast
Add Favorite
Strengthening Security Program Outcomes...
As enterprise infrastructures have expanded in scope and complexity, so too have the cyberthreats that target them. In today’s digital-first environment, legacy security controls are unlikely to be able to stand up to the volume and sophistication of these attacks. Even newer security software may be overwhelming and require nuanced human intervention, which is not always accessible due to the continuing security skills shortage. To addr...
December 21, 2022
Organizer: Blackberry Cybersecurity
Location: Webcast
Add Favorite
Magnitude of Software Supply Chain Vuln...
Fact: 4 in 5 infosec leaders say their software supply chains were exposed to cyberattacks in the last 12 months. That’s just one of many surprising stats from BlackBerry’s new research exposing the magnitude of software supply chain vulnerabilities in today’s organizations. Join experts from BlackBerry’s Product Security, Critical Event Management, and Cybersecurity Threat Research & Intelligence teams at our next...
December 20, 2022
Organizer: Blackberry
Location: Webcast
Add Favorite
Back to Search Begin New Search